Displaying 4 results from an estimated 4 matches for "have_evp_sha256".
2014 Jul 15
2
missing HAVE_EVP_RIPEMD160 breaks ssh client
Hello,
I've updated sources but forgot to recreate configure so I've ended without
#define HAVE_EVP_RIPEMD160 1
and ssh client ended with:
OpenSSH_6.7p1, OpenSSL 1.0.1h-fips 5 Jun 2014
debug1: Reading configuration data ssh.config
main: mux digest failed
The problem was that ssh_digest_by_alg() couldn't verify alg with an index bigger than 1 since
the line with SSH_DIGEST_RIPEMD160
2013 Apr 05
1
Using hmac-sha2-256 in OpenSSH 6.2p1
Hi,
I could not use hmac-sha2-256 in OpenSSH 6.2p1. I tried configuring in
sshd_config file also, but the server was not starting. How can I use
hmac-sha2-256 & hmac-sha2-512 in OpenSSH server in accordance with RFC
6668?
I have installed OpenSSH in a computer with the following configuration:
Architecture: x86 32-bit
OS: RHEL AS 4 (Nahant update 4) (Linux version 2.6.9-42.EL)
Thanks and
2012 Nov 24
0
ssh-keyscan continuity patch --
...9-24 08:11:14.000000000 -0400
+++ openssh-6.1p1/kex.c 2012-05-08 20:47:32.666853000 -0400
@@ -49,6 +49,7 @@
#include "dispatch.h"
#include "monitor.h"
#include "roaming.h"
+#include "canohost.h"
#if OPENSSL_VERSION_NUMBER >= 0x00907000L
# if defined(HAVE_EVP_SHA256)
@@ -366,11 +367,19 @@
choose_hostkeyalg(Kex *k, char *client, char *server)
{
char *hostkeyalg = match_list(client, server, NULL);
- if (hostkeyalg == NULL)
- fatal("no hostkey alg");
+ if (hostkeyalg == NULL) {
+ if (k->server)
+ fatal("bad '%.100s' hostkey alg...
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |